Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LAN to LAN VPN

    Scheduled Pinned Locked Moved IPsec
    1 Posts 1 Posters 611 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I Offline
      it_support
      last edited by

      I am not sure If I am in right place.

      We need to make a LAN to LAN VPN from our network (Pfsense Firewall) with another network which is using Cisco ASA firewall.

      I tried to create a IPSec tunnel but I am not sure if I am doing right.

      Remote side's Network administrator sent me this info below.

      Our NAT over the VPN will always be seen as Public IP (this would be the remote SA).

      We are asking you to NAT/PAT any of the traffic traversing the VPN. The NAT range selected by your network team is 172.19.130.176 /29 (this would be the local SA).

      We suggest using 172.19.130.176 as a general NAT for any traffic initiated from your site to the 64.132.91.21 address.

      Phase 1 of the VPN will utilize AES256-SHA1-HMAC (group 5) Phase 2 of the VPN will utilize AES-256-SHA1 (group 5) MAIN mode should be utilized.

      Could you please help me with this issue?

      Thanks,

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.